{"id":189,"date":"2026-02-11T01:33:15","date_gmt":"2026-02-11T01:33:15","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/toddcraig\/?p=189"},"modified":"2026-02-11T01:33:15","modified_gmt":"2026-02-11T01:33:15","slug":"cyse-201s","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/toddcraig\/2026\/02\/11\/cyse-201s\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.cm-alliance.com\/hs-fs\/hubfs\/60776739_l%20(1).webp?width=1170&amp;name=60776739_l%20(1).webp\" alt=\"Featured Image\" \/><\/figure>\n\n\n\n<p>(2021). Cyber Management Alliance. Retrieved from https:\/\/www.cm-alliance.com\/cybersecurity-blog\/what-is-cyber-security.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/i.pinimg.com\/originals\/43\/aa\/af\/43aaaffac7cd2fdbb9d5f88ac663f3fc.png\" alt=\"\" \/><\/figure>\n\n\n\n<p>(N.d.). Retrieved from https:\/\/i.pinimg.com\/originals\/43\/aa\/af\/43aaaffac7cd2fdbb9d5f88ac663f3fc.png.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.enterpriseappstoday.com\/wp-content\/uploads\/2022\/07\/Important-Cyber-Security-Practices.jpg\" alt=\"8 Important Cyber Security Practices For Small To Medium-Size Business\" \/><\/figure>\n\n\n\n<p>(2022). 8 Important Cyber Security Practices For Small To Medium-Size Business . Retrieved from https:\/\/www.enterpriseappstoday.com\/guide\/8-important-cyber-security-practices-for-small-to-medium-size-business.html.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>(2021). Cyber Management Alliance. Retrieved from https:\/\/www.cm-alliance.com\/cybersecurity-blog\/what-is-cyber-security. (N.d.). Retrieved from https:\/\/i.pinimg.com\/originals\/43\/aa\/af\/43aaaffac7cd2fdbb9d5f88ac663f3fc.png. (2022). 8 Important Cyber Security Practices For Small To Medium-Size Business . Retrieved from https:\/\/www.enterpriseappstoday.com\/guide\/8-important-cyber-security-practices-for-small-to-medium-size-business.html.<\/p>\n","protected":false},"author":31897,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/toddcraig\/wp-json\/wp\/v2\/posts\/189"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/toddcraig\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/toddcraig\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/toddcraig\/wp-json\/wp\/v2\/users\/31897"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/toddcraig\/wp-json\/wp\/v2\/comments?post=189"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/toddcraig\/wp-json\/wp\/v2\/posts\/189\/revisions"}],"predecessor-version":[{"id":190,"href":"https:\/\/sites.wp.odu.edu\/toddcraig\/wp-json\/wp\/v2\/posts\/189\/revisions\/190"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/toddcraig\/wp-json\/wp\/v2\/media?parent=189"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/toddcraig\/wp-json\/wp\/v2\/categories?post=189"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/toddcraig\/wp-json\/wp\/v2\/tags?post=189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}